Sciweavers

3406 search results - page 646 / 682
» Computational models of classical conditioning
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 9 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
STOC
2010
ACM
199views Algorithms» more  STOC 2010»
14 years 1 months ago
Zero-One Frequency Laws
Data streams emerged as a critical model for multiple applications that handle vast amounts of data. One of the most influential and celebrated papers in streaming is the “AMSâ...
Vladimir Braverman and Rafail Ostrovsky
MOBISYS
2010
ACM
13 years 11 months ago
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Mobile sensing is difficult without power. Emerging Computational RFIDs (CRFIDs) provide both sensing and generalpurpose computation without batteries--instead relying on small ca...
Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak ...
COMGEO
2010
ACM
13 years 8 months ago
Exact join detection for convex polyhedra and other numerical abstractions
r Numerical Abstractions6 Roberto Bagnaraa , Patricia M. Hillb , Enea Zaffanellaa aDepartment of Mathematics, University of Parma, Italy bSchool of Computing, University of Leeds, ...
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
CVPR
2011
IEEE
13 years 4 months ago
Accelerated Low-Rank Visual Recovery by Random Projection
Exact recovery from contaminated visual data plays an important role in various tasks. By assuming the observed data matrix as the addition of a low-rank matrix and a sparse matri...
Yadong Mu, Jian Dong, Xiaotong Yuan, Shuicheng Yan